Lucene search

K
ibmIBM8B7BC825CAA1800876B2664D15849E00A0033705EBDA3BA002D10E3DB42CBDFC
HistoryMay 19, 2023 - 9:39 a.m.

Security Bulletin: IBM Sterling Connect:Direct for Microsoft Windows is affected by a security restrictions bypass due to Spring Framework [CVE-2023-20860]

2023-05-1909:39:17
www.ibm.com
16
ibm sterling
connect:direct
microsoft windows
vulnerability
spring framework
security restrictions bypass
cve-2023-20860
ibm
fix
update

0.001 Low

EPSS

Percentile

36.4%

Summary

There is a vulnerability in Spring Framework used by Integrated File Agent in IBM Sterling Connect:Direct for Microsoft Windows. IBM Sterling Connect:Direct for Microsoft Windows has addressed the applicable CVE. [CVE-2023-20860]

Vulnerability Details

CVEID:CVE-2023-20860
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote attacker to bypass security restrictions, caused by the use of an un-prefixed double wildcard pattern with the mvcRequestMatcher in Spring Security configuration. An attacker could exploit this vulnerability to create a mismatch in pattern matching between Spring Security and Spring MVC.
CVSS Base score: 9.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/250679 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect Direct for Microsoft Windows 6.2.0.0 - 6.2.0.4_iFix032

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by updating.

Product(s) Version(s) Remediation / Fix
IBM Sterling Connect:Direct for Microsoft Windows 6.2.0.0 - 6.2.0.4_iFix032 Apply 6.2.0.4_iFix033, available on Fix Central

Workarounds and Mitigations

None

0.001 Low

EPSS

Percentile

36.4%